Sfoglia per Autore

opzioni
Mostrati risultati da 1 a 20 di 46
Titolo Data di pubblicazione Autore(i) File
Securing the “bring your own device” policy 1-gen-2012 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 1-gen-2012 Armando, Alessandro; Merlo, Alessio; M., Migliardi; Verderame, Luca
An Empirical Evaluation of the Android Security Framework 1-gen-2013 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Trustworthy Opportunistic Access to the Internet of Services 1-gen-2013 Armando, Alessandro; Aniello, Castiglione; Costa, Gabriele; Ugo, Fiore; Merlo, Alessio; Verderame, Luca; Ilsun, You
Market-based security for mobile devices 1-gen-2013 Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Bring your own device, securely 1-gen-2013 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Breaking and fixing the Android Launching Flow 1-gen-2013 Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca
Security considerations related to the use of mobile devices in the operation of critical infrastructures 1-gen-2014 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Securing the ``Bring Your Own Device'' Paradigm 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Enabling BYOD through secure meta-market 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Formal modeling and automatic enforcement of Bring Your Own Device policies 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Trusted host-based card emulation 1-gen-2015 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Android vs. SEAndroid: An empirical assessment 1-gen-2016 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 1-gen-2016 Merlo, Alessio; Lorrai, Luca; Verderame, Luca
Developing a NATO BYOD security policy 1-gen-2016 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps. Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps 1-gen-2017 Costa, G.; Armando, A.; Verderame, L.; Biondo, D.; Bocci, G.; Mammoliti, R.; Toma, A.
Automatic security verification of mobile app configurations 1-gen-2018 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Towards Policy-Driven Monitoring of Fog Applications 1-gen-2019 Russo, Enrico; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis 1-gen-2019 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
Automated Security Analysis of IoT Software Updates 1-gen-2019 Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A.
Mostrati risultati da 1 a 20 di 46
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile